From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Challenging Machine Learning-Based Clone Detectors via Semantic-Preserving Code Transformations., , , , , и . IEEE Trans. Software Eng., 49 (5): 3052-3070 (2023)Erratum to Äccurate and Scalable Cross-Architecture Cross-OS Binary Code Search With Emulation"., , , и . IEEE Trans. Software Eng., 47 (5): 1088 (2021)Mystique: Evolving Android Malware for Auditing Anti-Malware Tools., , , , , , и . AsiaCCS, стр. 365-376. ACM, (2016)From Collision to Verdict: Responsibility Attribution for Autonomous Driving Systems Testing., , , , и . ISSRE, стр. 321-332. IEEE, (2023)Prediction of Vulnerability Characteristics Based on Vulnerability Description and Prompt Learning., , , , и . SANER, стр. 604-615. IEEE, (2023)CloneDifferentiator: Analyzing clones by differentiation., , и . ASE, стр. 576-579. IEEE Computer Society, (2011)Comparison and Evaluation of Clone Detection Techniques with Different Code Representations., , , , , и . ICSE, стр. 332-344. IEEE, (2023)Avoiding Some Common Preprocessing Pitfalls with Feature Queries., , , и . APSEC, стр. 283-290. IEEE Computer Society, (2009)Securing Android App Markets via Modeling and Predicting Malware Spread Between Markets., , , , и . IEEE Trans. Inf. Forensics Secur., 14 (7): 1944-1959 (2019)Improving Product Line Architecture Design and Customization by Raising the Level of Variability Modeling., , , , , и . ICSR, том 6727 из Lecture Notes in Computer Science, стр. 151-166. Springer, (2011)